Previous Page: Appliance Groups and Multi-homed Configurations  Next Page: Using and Tuning iChain Features

Using Token Authentication with iChain

You can configure Novell iChain to leverage the authentication service provided by Novell Modular Authentication Service (NMAS) Enterprise Edition. You can set up your iChain users so they are required to authenticate to eDirectory using a token device. This adds a higher level of protection to your information by ensuring that only those who have the proper token code can have access to your information.

There are three steps you must perform to set up token authentication with iChain:

  1. Installing NMAS, Novell RADIUS, and a Token Method.
  2. Configuring Novell RADIUS Components.
  3. Setting Up the iChain RADIUS Client.

Installing NMAS, Novell RADIUS, and a Token Method

You must install NMAS into your eDirectory tree. NMAS is included on the iChain Authorization Server CD under the \NMASSERVER directory. Change to this directory and run SETUP.EXE.

As part of the NMAS installation, you can select and install the Novell RADIUS server components.

IMPORTANT:  The NMAS installation screen lists NICI 1.5.7 or later on the NMAS server. You will need to install NICI 2.01 on the NMAS server. This version of NICI is included on the iChain Authorization Server CD under the \NICI directory.

If you run ConsoleOne from a different location than the NMAS server, you will want to install the NMAS ConsoleOne snap-ins to that location. To do this, change to the \NMASCONSOLEONE directory on the iChain Authorization Server CD and run SNAPININSTALL.EXE. This will allow you to install the NMAS ConsoleOne snap-ins to any location you choose.

IMPORTANT:  Your NMAS server must reside in the same eDirectory tree as your iChain LDAP server that holds the Access Control List (ACL). This allows the ACL to recognize users who are authenticating using NMAS and to allow the users access to the information they need.

After NMAS is installed, you can select, install, and set up a third-party token login method. The token login methods are available for download at the iChain Web site . Documentation on how to install and use each token login method is provided by the partner who developed the login method.

For more information on installing NMAS, see the NMAS 2.0 Installation Quick Start at the Novell Documentation Web site .

For more information on installing and configuring Novell RADIUS, see the Novell RADIUS Administration Guide at the Novell Documentation Web site .

For general information on installing and setting up a login method, see the NMAS 2.0 Administration Guide at the Novell Documentation Web site .

For specific information on installing and using a login method, see the documentation provided by the login method partner.


Configuring Novell RADIUS Components

After NMAS, Novell RADIUS, and the token login method have been installed, you must configure Novell RADIUS on your NMAS server.

Perform the following procedures in order:

Creating a Dial Access System (DAS) Object
Configuring the Login Policy Rules
Adding the iChain Proxy Server As a Client of the Dial Access System (DAS) Object
Creating a RADIUS Dial Access Profile (DAP) Object
Adding an Attribute to the RADIUS Dial Access Profile (DAP) Object
Assigning the Token Method to Each User Object
Assigning the DAS Object to Each User Object
Starting Novell RADIUS Services on Your NMAS Server


Creating a Dial Access System (DAS) Object

  1. Start ConsoleOne.

  2. Right-click an Organizational Unit container object > click New > Object > RADIUS:Dial Access System.

  3. Specify the object name.

  4. Click OK.

  5. Specify the password.

  6. Click OK.


Configuring the Login Policy Rules

  1. Start ConsoleOne.

  2. From the Security Container, double-click the Login Policy object.

  3. Click the Rules tab.

  4. Click + to add a login rule.

  5. On the User list tab, click + and select the user or container that you want the rule to apply to.

  6. On the Sequences tab, click + > select the token method > select Mandatory.

  7. Click OK > OK > OK.


Adding the iChain Proxy Server As a Client of the Dial Access System (DAS) Object

  1. Start ConsoleOne.

  2. Double-click the DAS object.

  3. On the Clients tab, click Add.

  4. For Address, type the IP address of your iChain proxy server.

  5. For Vendor Type, use the drop-down list > select Novell.

  6. Type and confirm a secret for this client.

  7. Click OK.

  8. On the User Resolution tab, click the Use Lookup Contexts List to Resolve User Name radio button if the users are not in the same context as the DAS object.

  9. Click Add.

  10. Browse and highlight the container where the User objects reside.

  11. In the Object Name field, type a name for the object.

  12. Click OK > OK.


Creating a RADIUS Dial Access Profile (DAP) Object

  1. Start ConsoleOne.

  2. Right-click an Organizational Unit container object and click New > Object > RADIUS:Profile.

  3. Click OK.

  4. Specify the object name.

  5. Click OK.


Adding an Attribute to the RADIUS Dial Access Profile (DAP) Object

  1. Start ConsoleOne.

  2. Double-click the DAP object.

  3. On the Attributes tab, click Add.

  4. Select the Novell eDirectory Name attribute.

  5. Check the box next to Novell eDirectory attribute.

  6. Select FDN (Fully Distinguished Name).

    IMPORTANT:  It is critical that you select FDN so that name resolution will work properly. Otherwise, the users who use this profile will get 403 Forbidden errors when they try to access web pages.

  7. Click OK > OK.


Assigning the Token Method to Each User Object

  1. Start ConsoleOne.

  2. Double-click a User object.

  3. Click the Login Methods tab and select the Token method you previously installed.

  4. Follow the partner's instructions for enabling this method.


Assigning the DAS Object to Each User Object

  1. Start ConsoleOne.

  2. Double-click a User object.

  3. Click the Dial Access Services tab.

  4. Select a Dial Access Control.

  5. Browse and select the DAS object you want to assign to this user.

  6. Click Add.

  7. Browse and select the DAP object.

  8. Click OK > OK.


Starting Novell RADIUS Services on Your NMAS Server

From the NMAS server console, type RADIUS. This will start the RADIUS services.


Setting Up the iChain RADIUS Client


Adding a RADIUS Authentication Profile

  1. In the iChain Proxy Server Administration tool, click Configure > Authentication > Insert.

  2. Enter a name for the Radius profile.

  3. Click RADIUS authentication > RADIUS Options.

  4. Enter the RADIUS server's IP address.

  5. Enter 1645 for the Novell NMAS RADIUS server's port number.

  6. Enter the shared secret set up in Adding the iChain Proxy Server As a Client of the Dial Access System (DAS) Object.

  7. Click OK > OK > Apply.


Adding RADIUS Authentication to an Accelerator

  1. In the iChain Proxy Server Administration tool, click Configure > Web Server Accelerator.

  2. Select the accelerator you want to add the RADIUS authentication profile to.

  3. Click Modify > Enable Authentication > Authentication Options.

  4. HighLight the Radius profile created in Adding a RADIUS Authentication Profile.

  5. Click Add > OK > OK > Apply.

You are now ready to authenticate through RADIUS by using the token login method.



  Previous Page: Appliance Groups and Multi-homed Configurations  Next Page: Using and Tuning iChain Features